Editor’s Note: This post was originally published in April 2015 and has been updated for accuracy and comprehensiveness. “Web cookies.” We see this term thrown around online quite a bit, whether it be in dialogue boxes requesting permission to use them, or site...

I recently spoke at the NJ-GMIS Cyber Security Briefing at New Jersey’s Regional Operations and Intelligence Center (ROIC) on approaches to reducing risk in municipal governments via third-party assessment. The presentation ended up getting very interesting when we...

On a recent network penetration test our password catcher software sniffed out a service account logging in and caught its credentials. The hashed password we retrieved was nine characters long. With our homemade password cracking device (which has “only” four GPUs)...